fault resilient booting of complex multi-rail processors in an information handling system insures that all processor voltage rails are functioning properly before any processor fetches operating software code. In addition, the information handling system will automatically reboot when one or more of the processors fail during either a built-in self test (BIST) or a power failure provided that there is at least one good processor remaining in the information handling system to power-on self-test (POST) the information handling system again.

Patent
   7290128
Priority
Apr 04 2005
Filed
Apr 04 2005
Issued
Oct 30 2007
Expiry
Apr 21 2026
Extension
382 days
Assg.orig
Entity
Large
6
13
all paid
6. A method for fault resilient boot of complex multi-rail processors in an information handling system, said method comprising the steps of:
clearing processor dc-to-dc regulator failure status for all processors of an information handling system upon initial power-up;
detecting when a PS_ON# is asserted;
clearing a frb_enable upon detecting the asserted PS_ON# signal;
detecting when a system_powergood is asserted;
setting the frb_enable upon detecting the asserted system_powergood;
determining if there are any dc-to-dc regulator failures;
setting a respective status bit for each failed dc-to-dc regulator;
disabling each processor coupled to a failed dc-to-dc regulator;
masking the status bit for each failed dc-to-dc regulator; and
rebooting the information handling system with only those processors coupled to good dc-to-dc regulators.
20. An apparatus for fault resilient boot of complex multi-rail processors in an information handing system, comprising:
means for storing failure status of each dc-to-dc regulator associated with a processor in a multiprocessor information handling system;
means for clearing the failure status of each of the first dc-to-dc regulators upon initial system power-up;
means for detecting when a PS_ON# is asserted;
means for clearing a frb_enable upon detection of the asserted PS_ON# signal;
means for detecting when a system_powergood signal is asserted;
means for setting the frb_enable upon detecting the asserted system_powergood signal;
means for determining if there are any dc-to-dc regulator failures;
means for setting a status bit for each failed dc-to-dc regulator in the failure status storing means;
means for disabling each processor coupled to a failed dc-to-dc regulator;
means for masking the status bit for each failed dc-to-dc regulator; and
means for rebooting the information handling system with only those processors coupled to good dc-to-dc regulators.
1. A method for fault resilient boot of complex multi-rail processors in an information handling system, said method comprising the steps of:
clearing processor dc-to-dc regulator failure status for all processors of an information handling system upon initial power-up;
setting frb_enable when asserting PS_ON#, wherein frb_enable remains set until PS_ON# is de-asserted;
setting a processor dc-to-dc regulator status as failed when an associated processor dc-to-dc regulator has failed;
checking all processor dc-to-dc regulator status to determine if no processor dc-to-dc regulator has failed, then coupling all processor Powergood signals directly to system_powergood generation logic;
otherwise if at least one processor dc-to-dc regulator status is set as a failure, then masking the associated processor Powergood signal by forcing it indicate good status before coupling to the system_powergood generation logic; and
rebooting the information handling system with the remaining processors having good dc-to-dc regulators and disabling the processor having the failed dc-to-dc regulator.
7. An information handing system having fault resilient boot of complex multi-rail processors, said system comprising:
a plurality of processors, each of the plurality of processors having a first dc-to-dc regulator, each group of the plurality of processors having a common second dc-to-dc regulator, and all of the plurality of processors having a common third dc-to-dc regulator;
means for clearing failure status of each of the first dc-to-dc regulators upon initial system power-up;
means for detecting when a PS_ON# is asserted;
means for clearing a frb_enable upon detection of the asserted PS_ON# signal;
means for detecting when a system_powergood signal is asserted;
means for setting the frb_enable upon detecting the asserted system_powergood signal;
means for determining if there are any dc-to-dc regulator failures;
means for setting a respective status bit for each failed dc-to-dc regulator;
means for disabling each processor coupled to a failed dc-to-dc regulator;
means for masking the status bit for each failed dc-to-dc regulator; and
means for rebooting the information handling system with only those processors coupled to good dc-to-dc regulators.
19. An apparatus for fault resilient boot of complex multi-rail processors in an information handing system, comprising:
a first bi-stable storage device having a clear input coupled to the PS_ON# output of the south bridge, a clock input coupled to a system POWERGOOD signal and an output of an frb_enable signal;
a plurality of second bi-stable storage devices, one for each of the first dc-to-dc regulators, for storing whether the respective first dc-to-dc regulator is functioning properly;
a plurality of multiplexers, each of the plurality of multiplexers coupled to respective ones of the plurality of second bi-stable storage devices, wherein each of the plurality of multiplexers has an output of a conditioned dc-to-dc power good signal, wherein each of the conditioned dc-to-dc power good signals is either a power good signal representing a respective functioning first dc-to-dc regulator or a masked power good signal associated with a non-functioning first dc-to-dc regulator; and
a logic circuit for generating the system POWERGOOD signal when all conditioned dc-to-dc power good signals indicate a first logic level, wherein the first bi-stable storage device sets the frb_enable signal when the system POWERGOOD signal is generated, and any of the plurality of processors coupled to non-functioning first dc-to-dc regulators will be disabled before the information handling system reboots.
2. The method according to claim 1, wherein the system_powergood generation logic is AND logic.
3. The method according to claim 1, wherein the step of setting frb_enable comprises the step of latching the frb_enable as set until the PS_ON# is de-asserted.
4. The method according to claim 1, wherein the step of setting the processor dc-to-dc regulator status as failed comprises setting the failure status on a falling edge of the associated processor's Powergood signal.
5. The method according to claim 3, wherein the failure status is not cleared until a next AC power cycle.
8. The system according to claim 7, wherein the means for clearing failure status of each of the first dc-to-dc regulators is done with a STANDBY_PWRGD signal to clear a first bi-stable storage device associated with each of the first dc-to-dc regulators.
9. The system according to claim 7, wherein the means for detecting when the PS_ON# is asserted is done with a second bi-stable storage device.
10. The system according to claim 9, wherein the means for clearing the frb_enable upon detection of the asserted PS_ON# signal is done with the second bi-stable storage device.
11. The system according to claim 9, wherein the means for setting the frb_enable upon detecting the asserted system_powergood signal is done with the second bi-stable storage device.
12. The system according to claim 7, wherein the means for determining if there are any dc-to-dc regulator failures is indicated with a DC2DC_PWRGD signal from each of the first dc-to-dc regulators.
13. The system according to claim 8, wherein the means for setting a respective status bit for each failed dc-to-dc regulator is done by setting the first bi-stable storage device associated with each failed dc-to-dc regulator.
14. The system according to claim 8, wherein the means for disabling each processor coupled to a failed dc-to-dc regulator is done with the first bi-stable storage device associated with each failed dc-to-dc regulator.
15. The system according to claim 8, wherein the means for masking the status bit for each failed dc-to-dc regulator is done with a multiplexer coupled to an output of the first bi-stable storage device.
16. The system according to claim 8, further comprising a power-on control coupled to south bridge logic having a CPU_SMI# output and an output for generating the PS_ON#.
17. The system according to claim 8, wherein an output from each of the first bi-stable storage devices associated with the first dc-to-dc regulators is used to control respective multiplexers, and each of the respective multiplexers is used for masking the status bit for each failed dc-to-dc regulator.
18. The system according to claim 8, wherein an output from each of the first bi-stable storage devices associated with the first dc-to-dc regulators is used with the means for disabling each processor coupled to an associated failed dc-to-dc regulator.

1. Field of the Invention

The present invention relates generally to information handling systems and, more particularly, to robust booting of complex multi-rail processors in the information handling system.

2. Description of the Related Art

As the value and use of information continues to increase, individuals and businesses seek additional ways to process and store information. One option available to users are information handling systems. An information handling system generally processes, compiles, stores, and/or communicates information or data for business, personal, or other purposes, thereby allowing users to take advantage of the value of the information. Because technology and information handling needs and requirements vary between different users or applications, information handling systems may also vary regarding what information is handled, how the information is handled, how much information is processed, stored, or communicated, and how quickly and efficiently the information may be processed, stored, or communicated. The variations in information handling systems allow for information handling systems to be general or configured for a specific user or specific use such as financial transaction processing, airline reservations, enterprise data storage, or global communications. In addition, information handling systems may include a variety of hardware and software components that may be configured to process, store, and communicate information and may include one or more computer systems, data storage systems, and networking systems, e.g., computer, personal computer workstation, portable computer, computer server, print server, network router, network hub, network switch, storage area network disk array, RAID disk system and telecommunications switch.

An information handling system having multiprocessors may include a fault resilient boot (FRB) that provides a mechanism for automatically booting up the information handling system in the event that one or more of the processors, e.g., central processing unit (CPU), fail due to either a built-in self test (BIST) problem or power-up fault (failure) during a power-on self-test (POST), so long as there is at least one functioning processor remaining in the information handling system during a subsequent POST.

A processor voltage rail type FRB may be achieved by gating the processor's system management interrupt (SMI) input with the processor's associated “Powergood” signal. The Powergood signal indicates that the necessary operating voltages to the processor have stabilized (e.g., the voltage regulators supplying the processor are functioning properly with the correct voltage outputs to the processor voltage rails). Therefore, a processor not having correct operating voltages may be kept in a disabled condition by maintaining assertion of the associated SMI# input during what would normally be a system reset de-assertion of the SMI# input to the processor. However, this is not easily implemented because the newer technology processors have multiple power rails, e.g., three or more separate power rails. The CPU Vcore power rail may be the only rail that is specific to a particular processor, whereas the rest of the power rails may be commonly shared between the plurality of processors, e.g., VTT, Vcache for the L3 cache, etc.

When the processors share multiple common power rails, in order to ensure that all of the processor power rails are functioning properly before any of the processors begin fetching program code, a “System Powergood” may utilize AND logic to insure that all processors have properly powered-up. However, the AND logic becomes complicated when a rail to a processor is not functioning properly and thereby requires masking the Powergood signal of the processor having the faulty voltage rail.

The present invention remedies the shortcomings of the prior art by providing a system, method and apparatus for fault resilient booting of complex multi-rail processors in an information handling system that insures that all processor voltage rails are functioning properly before any processor fetches operating software code. In addition, the information handling system will automatically reboot when one or more of the processors fail during either a built-in self test (BIST) or a power failure provided that there is at least one good processor remaining in the information handling system to power-on self-test (POST) the information handling system again.

According to a specific embodiment of the present invention, the following steps may be performed:

A technical advantage of the present invention is ensuring that all processor voltage rails are functioning properly before any processor fetches operating software code. Still another technical advantage is automatic booting of an information handling system when one or more processors fail due to either built-in self test (BIST) or power failure provided that there is at least one good processor remaining in the information handling system to power-on self-test (POST) again. Other technical advantages should be apparent to one of ordinary skill in the art in view of what has been disclosed herein.

A more complete understanding of the present disclosure and advantages thereof may be acquired by referring to the following description taken in conjunction with the accompanying drawings wherein:

FIG. 1 is a schematic block diagram of an exemplary embodiment of an information handling system; according to teachings of the present disclosure;

FIG. 2 is a schematic block diagram of DC-to-DC regulators coupled to the multi-processors used in the information handling system illustrated in FIG. 1;

FIG. 3 is a schematic diagram of a specific embodiment of a fault resilient boot circuit in a multi-processor information handling system, according to teachings of the present disclosure;

FIG. 4 is a schematic timing diagram of the fault resilient boot circuit illustrated in FIG. 3; and

FIG. 5 is a flow diagram of the operation of a specific embodiment of the fault resilient boot, according to teachings of the present disclosure.

The present invention may be susceptible to various modifications and alternative forms. Specific exemplary embodiments thereof are shown by way of example in the drawing and are described herein in detail. It should be understood, however, that the description set forth herein of specific embodiments is not intended to limit the present invention to the particular forms disclosed. Rather, all modifications, alternatives, and equivalents falling within the spirit and scope of the invention as defined by the appended claims are intended to be covered.

For purposes of this disclosure, an information handling system may include any instrumentality or aggregate of instrumentalities operable to compute, classify, process, transmit, receive, retrieve, originate, switch, store, display, manifest, detect, record, reproduce, handle, or utilize any form of information, intelligence, or data for business, scientific, control, or other purposes. For example, an information handling system may be a personal computer, a network storage device, or any other suitable device and may vary in size, shape, performance, functionality, and price. The information handling system may include random access memory (RAM), one or more processing resources such as a central processing unit (CPU), hardware or software control logic, read only memory (ROM), and/or other types of nonvolatile memory. Additional components of the information handling system may include one or more disk drives, one or more network ports for communicating with external devices as well as various input and output (I/O) devices, such as a keyboard, a mouse, and a video display. The information handling system may also include one or more buses operable to transmit communications between the various hardware components.

Referring now to the drawings, the details of specific exemplary embodiments of the present invention are schematically illustrated. Like elements in the drawings will be represented by like numbers, and similar elements will be represented by like numbers with a different lower case letter suffix.

Referring to FIG. 1, depicted is an information handling system having electronic components mounted on at least one printed circuit board (PCB) (motherboard) and communicating data and control signals therebetween over signal buses. In one embodiment, the information handling system is a computer system. The information handling system, generally referenced by the numeral 100, comprises a plurality of processors 110 coupled to a host bus(es) 120. A north bridge 122, which may also be referred to as a memory controller hub or a memory controller, is coupled to a main system memory 124. The north bridge 122 is coupled to the system processors 110 via the host bus(es) 120. The north bridge 122 is generally considered an application specific chip set that provides connectivity to various buses, and integrates other system functions such as a memory interface. For example, an Intel 820E and/or 815E chip set, available from the Intel Corporation of Santa Clara, Calif., provides at least a portion of the north bridge 122. The chip set may also be packaged as an application specific integrated circuit (ASIC). The north bridge 122 typically includes functionality to couple the main system memory 124 to other devices within the information handling system 100. Thus, memory controller functions such as main memory control functions typically reside in the north bridge 122. In addition, the north bridge 122 provides bus control to handle transfers between the host bus 120 and a second bus(es), e.g., PCI bus 134, AGP bus 136 coupled to a video graphics interface 126 which drives a video display 128. A third bus(es) 132 may also comprise other industry standard buses or proprietary buses, e.g., ISA, SCSI, I2C, SPI, USB buses through a south bridge(s) (bus interface) 130.

Referring to FIG. 2, depicted is a schematic block diagram of DC-to-DC regulators coupled to the multi-processors used in the information handling system illustrated in FIG. 1. Each processor 110 requires various operating voltages that may be derived from different DC-to-DC regulators. Each processor 110 may have a dedicated DC-to-DC regulator 212, e.g., for the processor CPU core, common to some of the processors 110 DC-to-DC regulators 214, e.g., for cache memories of some of the processors, and common system DC-to-DC regulator 216, e.g., VTT for all of the processors. The information handling system 100 may function at reduced capacity and/or speed when one or more of the processors 110 fail. Generally, a processor 110 will fail if it does not receive correct operating voltages from the associated DC-to-DC regulators. If a dedicated DC-to-DC regulator 212 should fail then only the one associated processor 110 becomes non-functional. If any of the other DC-to-DC regulators should fail, the processors 110 coupled thereto and receiving voltages therefrom will become non-functional. However, so long as there is at least one processor 110 that is coupled to functional DC-to-DC regulators, the information handling system 100 may function. For purposes of description in this disclosure signals called “Powergood” or “DC2DC_PWRGD” will be used to indicate that all power supply voltages to a processor have stabilized, e.g., there are correct voltage rail values required by the processor (CPU) 110.

Referring now to FIGS. 3 and 4, wherein FIG. 3 depicts a schematic diagram of a specific embodiment of a fault resilient boot circuit in a multi-processor information handling system, according to teachings of the present disclosure, and FIG. 4 depicts a schematic timing diagram of the fault resilient boot circuit illustrated in FIG. 3. When a power button 302 is activated so as to turn on the information handling system 100 (connects AC power to the power supply system—not shown), the south bridge 130 asserts a PS_ON# signal low (FIG. 4) to indicate that the power supply system has been activated. The south bridge 130 may also assert a CPU_SMI# low to disable all CPUs 310 of the processors 110 until voltages to the CPUs 310 have stabilized. The STANDBY PWRGD signal may clear all of the D flip-flops 306 (Q-output at logic low). There may be a plurality of CPUs 310, e.g., from 2 to n, where n is a positive integer number greater than 2.

Upon initial AC power up of the information handling system 100, a D flip-flop 304 is held in clear (CLR#) through the inverter 320 until the PS_ON# signal is low (e.g., logic level 0) then whenever a SYSTEM POWERGOOD signal, coupled to the clock input of the D flip-flop 304, goes high the FRB_ENABLE signal goes from a low to a high logic level. However, the SYSTEM POWERGOOD signal will not go high until all inputs to the AND gate 316 are high. Therefore, until the FRB_ENABLE signal goes high, clock inputs to the D flip-flops 306 remain low. So long as the clock inputs of the D flip-flops 306 remain low, the multiplexers 312 couple the DC2DC_PWRGD signals to the inputs of the AND gate 316. When all of the DC2DC_PWRGD signals go high, the output of the AND gate 316 produces the SYSTEM POWERGOOD signal at a high logic level (SYSTEM_PWRGD FIG. 4). Upon the POWERGOOD signal going high, the Q output of the D flip-flop 304 asserts a logic high for the FRB_ENABLE signal.

Once the FRB_ENABLE signal is high, AND gates 308 are enabled for receiving any level change of the DC2DC_PWRGD signals from each of the respective CPU voltage rails 318. The clock input to the D flip-flop 306 is high when both the FRB_ENABLE and DC2DC_PWRGD signals are high. If the clock input to the D flip-flop 306 goes low because of a DC2DC_PWRGD signal going low (indicating a voltage rail failure), then the Q output of the D flip-flop 306 goes high. When a DC2DC_PWRGD signal goes low, the SYSTEM POWERGOOD signal will also go low (see FIG. 4). However, according to this specific embodiment, the D flip-flop 306 coupled to a DC2DC_PWRGD signal going low to the clock input of the D flip-flop 306 will cause its Q output to go high, thereby causing the multiplexer 312 to couple a logic high to the input of AND gate 316. The Q-not output of this D flip-flop 306 will go low and will cause the respective CPU 310 SMI# signal to remain low which thereby continuously disables the respective CPU 310. The information handling system 100 fault resilient boot (FRB) program will now automatically reboot the processors 110, but with the processor(s) 110 having the faulty voltage rail 318 remaining disabled. Thus, so long as there is at least one DC2DC_PWRGD signal high from a good voltage rail 318, the information handling system 100 will reboot and operate, but with less processing power. The multiplexer 312 associated with a disabled CPU 310 will always force a logic high (mask the DC2DC_PWRGD signal at the logic low) to an input of the AND gate 316 so that the information handling system 100 may recover from a processor voltage rail fault.

Referring to FIG. 5, depicted is a flow diagram of the operation of a specific embodiment of a fault resilient boot, according to teachings of the present disclosure. In step 502, DC-to-DC regulator failure status bits, e.g., register and/or digital flip-flops, are cleared when power is first applied to the information handling system. In step 504; when assertion of the PS_ON# signal is determined, the FRB_ENABLE is cleared in step 506. Step 508 determines when the SYSTEM POWERGOOD is asserted, then in step 510 the FRB_ENABLE is set. Step 512 determines when an individual DC-to-DC regulator has failed, and when the DC-to-DC regulator fails, a status bit, e.g., register or digital flip-flop, associated with the failed DC-to-DC regulator is set in step 514. In step 516, the processor associated with the failed DC-to-DC regulator is disabled, and in step 518 the DC2DC_PWRGD signal associated with the failed DC-to-DC regulator is masked. In step 520 an FRB system reboot is performed with any failed DC-to-DC regulator DC2DC_PWRGD signal masked and associated processor disabled. Thus, the information handling system will reboot with the remaining processors having good DC-to-DC regulators.

The invention, therefore, is well adapted to carry out the objects and to attain the ends and advantages mentioned, as well as others inherent therein. While the invention has been depicted, described, and is defined by reference to exemplary embodiments of the invention, such references do not imply a limitation on the invention, and no such limitation is to be inferred. The invention is capable of considerable modification, alteration, and equivalents in form and function, as will occur to those ordinarily skilled in the pertinent arts and having the benefit of this disclosure. The depicted and described embodiments of the invention are exemplary only, and are not exhaustive of the scope of the invention. Consequently, the invention is intended to be limited only by the spirit and scope of the appended claims, giving full cognizance to equivalents in all respects.

Habib, Ahsan

Patent Priority Assignee Title
7526674, Dec 22 2005 LENOVO INTERNATIONAL LIMITED Methods and apparatuses for supplying power to processors in multiple processor systems
8112653, Oct 19 2005 Hynix Semiconductor Inc. Apparatus and method of generating power-up signal of semiconductor memory apparatus
8285893, Oct 13 2006 Dell Products L.P. System and method for adaptively setting connections to input/output hubs within an information handling system
8578183, Nov 29 2010 Inventec Corporation Server system with direct current transformation units receiving power on signal and generating operating voltage and ready signal
8726088, Nov 25 2011 Inventec Corporation Method for processing booting errors
9223365, Mar 16 2013 Intel Corporation Method and apparatus for controlled reset sequences without parallel fuses and PLL'S
Patent Priority Assignee Title
5659748, Jun 26 1991 JINGPIN TECHNOLOGIES, LLC Booting of multiprocessor system from a boot ROM of narrower width than the system memory
5790850, Sep 30 1996 Intel Corporation Fault resilient booting for multiprocessor computer systems
6122735, May 21 1998 Intel Corp. Fault resilient boot circuit using ring counter
6191499, Oct 13 1999 International Business Machines Corporation System and method for providing voltage regulation to a multiple processor
6496881, Mar 11 1999 CONVERSANT INTELLECTUAL PROPERTY MANAGEMENT INC Method and apparatus for disabling a processor in a multiprocessor computer
6601165, Mar 26 1999 HEWLETT-PACKARD DEVELOPMENT COMPANY, L P Apparatus and method for implementing fault resilient booting in a multi-processor system by using a flush command to control resetting of the processors and isolating failed processors
6691235, Jul 27 2000 International Business Machines Corporation; International Business Machines Corp Automatic voltage regulation for processors having different voltage requirements and unified or split voltage planes
6792489, Mar 30 2001 Intel Corporation Multistage configuration and power setting
6792553, Dec 29 2000 Hewlett Packard Enterprise Development LP CPU power sequence for large multiprocessor systems
6826710, Jan 25 2001 Dell Products L.P. System and method for providing a fault-resilient boot
7149907, Jul 10 2003 Dell Products L.P. Multi-processor system recovery using THERMTRIP signal
20030005275,
20040215991,
////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////////
Executed onAssignorAssigneeConveyanceFrameReelDoc
Mar 30 2005HABIB, AHSANDell Products L PASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS 0164530381 pdf
Apr 04 2005Dell Products L.P.(assignment on the face of the patent)
Oct 29 2013Dell Products L PBANK OF NEW YORK MELLON TRUST COMPANY, N A , AS FIRST LIEN COLLATERAL AGENTPATENT SECURITY AGREEMENT NOTES 0318970348 pdf
Oct 29 2013DELL MARKETING L P BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS FIRST LIEN COLLATERAL AGENTPATENT SECURITY AGREEMENT NOTES 0318970348 pdf
Oct 29 2013Dell IncBANK OF NEW YORK MELLON TRUST COMPANY, N A , AS FIRST LIEN COLLATERAL AGENTPATENT SECURITY AGREEMENT NOTES 0318970348 pdf
Oct 29 2013DELL SOFTWARE INC BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS FIRST LIEN COLLATERAL AGENTPATENT SECURITY AGREEMENT NOTES 0318970348 pdf
Oct 29 2013COMPELLENT TECHNOLOGIES, INC BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS FIRST LIEN COLLATERAL AGENTPATENT SECURITY AGREEMENT NOTES 0318970348 pdf
Oct 29 2013BOOMI, INC BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS FIRST LIEN COLLATERAL AGENTPATENT SECURITY AGREEMENT NOTES 0318970348 pdf
Oct 29 2013ASAP SOFTWARE EXPRESS, INC BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS FIRST LIEN COLLATERAL AGENTPATENT SECURITY AGREEMENT NOTES 0318970348 pdf
Oct 29 2013APPASSURE SOFTWARE, INC BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS FIRST LIEN COLLATERAL AGENTPATENT SECURITY AGREEMENT NOTES 0318970348 pdf
Oct 29 2013CREDANT TECHNOLOGIES, INC BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS FIRST LIEN COLLATERAL AGENTPATENT SECURITY AGREEMENT NOTES 0318970348 pdf
Oct 29 2013ASAP SOFTWARE EXPRESS, INC BANK OF AMERICA, N A , AS COLLATERAL AGENTPATENT SECURITY AGREEMENT TERM LOAN 0318990261 pdf
Oct 29 2013BOOMI, INC BANK OF AMERICA, N A , AS COLLATERAL AGENTPATENT SECURITY AGREEMENT TERM LOAN 0318990261 pdf
Oct 29 2013GALE TECHNOLOGIES, INC BANK OF AMERICA, N A , AS COLLATERAL AGENTPATENT SECURITY AGREEMENT TERM LOAN 0318990261 pdf
Oct 29 2013FORCE10 NETWORKS, INC BANK OF AMERICA, N A , AS COLLATERAL AGENTPATENT SECURITY AGREEMENT TERM LOAN 0318990261 pdf
Oct 29 2013Dell USA L PBANK OF AMERICA, N A , AS COLLATERAL AGENTPATENT SECURITY AGREEMENT TERM LOAN 0318990261 pdf
Oct 29 2013DELL SOFTWARE INC BANK OF AMERICA, N A , AS COLLATERAL AGENTPATENT SECURITY AGREEMENT TERM LOAN 0318990261 pdf
Oct 29 2013Dell Products L PBANK OF AMERICA, N A , AS COLLATERAL AGENTPATENT SECURITY AGREEMENT TERM LOAN 0318990261 pdf
Oct 29 2013DELL MARKETING L P BANK OF AMERICA, N A , AS COLLATERAL AGENTPATENT SECURITY AGREEMENT TERM LOAN 0318990261 pdf
Oct 29 2013CREDANT TECHNOLOGIES, INC BANK OF AMERICA, N A , AS COLLATERAL AGENTPATENT SECURITY AGREEMENT TERM LOAN 0318990261 pdf
Oct 29 2013COMPELLENT TECHNOLOGIES, INC BANK OF AMERICA, N A , AS COLLATERAL AGENTPATENT SECURITY AGREEMENT TERM LOAN 0318990261 pdf
Oct 29 2013Dell USA L PBANK OF NEW YORK MELLON TRUST COMPANY, N A , AS FIRST LIEN COLLATERAL AGENTPATENT SECURITY AGREEMENT NOTES 0318970348 pdf
Oct 29 2013FORCE10 NETWORKS, INC BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS FIRST LIEN COLLATERAL AGENTPATENT SECURITY AGREEMENT NOTES 0318970348 pdf
Oct 29 2013DELL SOFTWARE INC BANK OF AMERICA, N A , AS ADMINISTRATIVE AGENTPATENT SECURITY AGREEMENT ABL 0318980001 pdf
Oct 29 2013Dell USA L PBANK OF AMERICA, N A , AS ADMINISTRATIVE AGENTPATENT SECURITY AGREEMENT ABL 0318980001 pdf
Oct 29 2013FORCE10 NETWORKS, INC BANK OF AMERICA, N A , AS ADMINISTRATIVE AGENTPATENT SECURITY AGREEMENT ABL 0318980001 pdf
Oct 29 2013GALE TECHNOLOGIES, INC BANK OF AMERICA, N A , AS ADMINISTRATIVE AGENTPATENT SECURITY AGREEMENT ABL 0318980001 pdf
Oct 29 2013Perot Systems CorporationBANK OF AMERICA, N A , AS ADMINISTRATIVE AGENTPATENT SECURITY AGREEMENT ABL 0318980001 pdf
Oct 29 2013SECUREWORKS, INC BANK OF AMERICA, N A , AS ADMINISTRATIVE AGENTPATENT SECURITY AGREEMENT ABL 0318980001 pdf
Oct 29 2013WYSE TECHNOLOGY L L C BANK OF AMERICA, N A , AS ADMINISTRATIVE AGENTPATENT SECURITY AGREEMENT ABL 0318980001 pdf
Oct 29 2013APPASSURE SOFTWARE, INC BANK OF AMERICA, N A , AS COLLATERAL AGENTPATENT SECURITY AGREEMENT TERM LOAN 0318990261 pdf
Oct 29 2013DELL MARKETING L P BANK OF AMERICA, N A , AS ADMINISTRATIVE AGENTPATENT SECURITY AGREEMENT ABL 0318980001 pdf
Oct 29 2013CREDANT TECHNOLOGIES, INC BANK OF AMERICA, N A , AS ADMINISTRATIVE AGENTPATENT SECURITY AGREEMENT ABL 0318980001 pdf
Oct 29 2013COMPELLENT TECHNOLOGIES, INC BANK OF AMERICA, N A , AS ADMINISTRATIVE AGENTPATENT SECURITY AGREEMENT ABL 0318980001 pdf
Oct 29 2013GALE TECHNOLOGIES, INC BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS FIRST LIEN COLLATERAL AGENTPATENT SECURITY AGREEMENT NOTES 0318970348 pdf
Oct 29 2013Perot Systems CorporationBANK OF NEW YORK MELLON TRUST COMPANY, N A , AS FIRST LIEN COLLATERAL AGENTPATENT SECURITY AGREEMENT NOTES 0318970348 pdf
Oct 29 2013SECUREWORKS, INC BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS FIRST LIEN COLLATERAL AGENTPATENT SECURITY AGREEMENT NOTES 0318970348 pdf
Oct 29 2013WYSE TECHNOLOGY L L C BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS FIRST LIEN COLLATERAL AGENTPATENT SECURITY AGREEMENT NOTES 0318970348 pdf
Oct 29 2013Dell IncBANK OF AMERICA, N A , AS ADMINISTRATIVE AGENTPATENT SECURITY AGREEMENT ABL 0318980001 pdf
Oct 29 2013APPASSURE SOFTWARE, INC BANK OF AMERICA, N A , AS ADMINISTRATIVE AGENTPATENT SECURITY AGREEMENT ABL 0318980001 pdf
Oct 29 2013ASAP SOFTWARE EXPRESS, INC BANK OF AMERICA, N A , AS ADMINISTRATIVE AGENTPATENT SECURITY AGREEMENT ABL 0318980001 pdf
Oct 29 2013BOOMI, INC BANK OF AMERICA, N A , AS ADMINISTRATIVE AGENTPATENT SECURITY AGREEMENT ABL 0318980001 pdf
Oct 29 2013Dell IncBANK OF AMERICA, N A , AS COLLATERAL AGENTPATENT SECURITY AGREEMENT TERM LOAN 0318990261 pdf
Oct 29 2013Perot Systems CorporationBANK OF AMERICA, N A , AS COLLATERAL AGENTPATENT SECURITY AGREEMENT TERM LOAN 0318990261 pdf
Oct 29 2013SECUREWORKS, INC BANK OF AMERICA, N A , AS COLLATERAL AGENTPATENT SECURITY AGREEMENT TERM LOAN 0318990261 pdf
Oct 29 2013WYSE TECHNOLOGY L L C BANK OF AMERICA, N A , AS COLLATERAL AGENTPATENT SECURITY AGREEMENT TERM LOAN 0318990261 pdf
Oct 29 2013Dell Products L PBANK OF AMERICA, N A , AS ADMINISTRATIVE AGENTPATENT SECURITY AGREEMENT ABL 0318980001 pdf
Sep 07 2016BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS COLLATERAL AGENTAPPASSURE SOFTWARE, INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400650618 pdf
Sep 07 2016BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS COLLATERAL AGENTASAP SOFTWARE EXPRESS, INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400650618 pdf
Sep 07 2016BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS COLLATERAL AGENTDELL MARKETING L P RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400650618 pdf
Sep 07 2016BANK OF AMERICA, N A , AS ADMINISTRATIVE AGENTWYSE TECHNOLOGY L L C RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400650216 pdf
Sep 07 2016BANK OF AMERICA, N A , AS ADMINISTRATIVE AGENTSECUREWORKS, INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400650216 pdf
Sep 07 2016BANK OF AMERICA, N A , AS ADMINISTRATIVE AGENTPerot Systems CorporationRELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400650216 pdf
Sep 07 2016BANK OF AMERICA, N A , AS ADMINISTRATIVE AGENTFORCE10 NETWORKS, INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400650216 pdf
Sep 07 2016BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS COLLATERAL AGENTCOMPELLENT TECHNOLOGIES, INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400650618 pdf
Sep 07 2016BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS COLLATERAL AGENTCREDANT TECHNOLOGIES, INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400650618 pdf
Sep 07 2016BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS COLLATERAL AGENTDell IncRELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400650618 pdf
Sep 07 2016BANK OF AMERICA, N A , AS COLLATERAL AGENTDell Products L PRELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400400001 pdf
Sep 07 2016BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS COLLATERAL AGENTWYSE TECHNOLOGY L L C RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400650618 pdf
Sep 07 2016BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS COLLATERAL AGENTSECUREWORKS, INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400650618 pdf
Sep 07 2016BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS COLLATERAL AGENTPerot Systems CorporationRELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400650618 pdf
Sep 07 2016BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS COLLATERAL AGENTFORCE10 NETWORKS, INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400650618 pdf
Sep 07 2016BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS COLLATERAL AGENTDELL SOFTWARE INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400650618 pdf
Sep 07 2016BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS COLLATERAL AGENTDell USA L PRELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400650618 pdf
Sep 07 2016BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS COLLATERAL AGENTDell Products L PRELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400650618 pdf
Sep 07 2016BANK OF AMERICA, N A , AS ADMINISTRATIVE AGENTDELL SOFTWARE INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400650216 pdf
Sep 07 2016BANK OF AMERICA, N A , AS ADMINISTRATIVE AGENTDell USA L PRELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400650216 pdf
Sep 07 2016BANK OF AMERICA, N A , AS COLLATERAL AGENTFORCE10 NETWORKS, INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400400001 pdf
Sep 07 2016BANK OF AMERICA, N A , AS COLLATERAL AGENTDELL SOFTWARE INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400400001 pdf
Sep 07 2016BANK OF AMERICA, N A , AS COLLATERAL AGENTDell USA L PRELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400400001 pdf
Sep 07 2016BANK OF AMERICA, N A , AS COLLATERAL AGENTDell IncRELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400400001 pdf
Sep 07 2016BANK OF AMERICA, N A , AS COLLATERAL AGENTCREDANT TECHNOLOGIES, INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400400001 pdf
Sep 07 2016BANK OF AMERICA, N A , AS COLLATERAL AGENTCOMPELLENT TECHNOLOGIES, INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400400001 pdf
Sep 07 2016BANK OF AMERICA, N A , AS COLLATERAL AGENTAPPASSURE SOFTWARE, INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400400001 pdf
Sep 07 2016BANK OF AMERICA, N A , AS COLLATERAL AGENTASAP SOFTWARE EXPRESS, INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400400001 pdf
Sep 07 2016BANK OF AMERICA, N A , AS COLLATERAL AGENTPerot Systems CorporationRELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400400001 pdf
Sep 07 2016BANK OF AMERICA, N A , AS COLLATERAL AGENTSECUREWORKS, INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400400001 pdf
Sep 07 2016BANK OF AMERICA, N A , AS ADMINISTRATIVE AGENTDell Products L PRELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400650216 pdf
Sep 07 2016BANK OF AMERICA, N A , AS ADMINISTRATIVE AGENTDell IncRELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400650216 pdf
Sep 07 2016BANK OF AMERICA, N A , AS ADMINISTRATIVE AGENTCREDANT TECHNOLOGIES, INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400650216 pdf
Sep 07 2016BANK OF AMERICA, N A , AS ADMINISTRATIVE AGENTCOMPELLANT TECHNOLOGIES, INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400650216 pdf
Sep 07 2016BANK OF AMERICA, N A , AS ADMINISTRATIVE AGENTAPPASSURE SOFTWARE, INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400650216 pdf
Sep 07 2016BANK OF AMERICA, N A , AS ADMINISTRATIVE AGENTASAP SOFTWARE EXPRESS, INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400650216 pdf
Sep 07 2016BANK OF AMERICA, N A , AS ADMINISTRATIVE AGENTDELL MARKETING L P RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400650216 pdf
Sep 07 2016BANK OF AMERICA, N A , AS COLLATERAL AGENTWYSE TECHNOLOGY L L C RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400400001 pdf
Sep 07 2016BANK OF AMERICA, N A , AS COLLATERAL AGENTDELL MARKETING L P RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0400400001 pdf
Sep 07 2016WYSE TECHNOLOGY L L C THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTSECURITY AGREEMENT0401360001 pdf
Sep 07 2016DELL SYSTEMS CORPORATIONTHE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTSECURITY AGREEMENT0401360001 pdf
Sep 07 2016DELL SOFTWARE INC THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTSECURITY AGREEMENT0401360001 pdf
Sep 07 2016Dell Products L PTHE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTSECURITY AGREEMENT0401360001 pdf
Sep 07 2016DELL MARKETING L P THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTSECURITY AGREEMENT0401360001 pdf
Sep 07 2016DELL INTERNATIONAL L L C THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTSECURITY AGREEMENT0401360001 pdf
Sep 07 2016ASAP SOFTWARE EXPRESS, INC THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTSECURITY AGREEMENT0401360001 pdf
Sep 07 2016Dell USA L PTHE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTSECURITY AGREEMENT0401360001 pdf
Sep 07 2016CREDANT TECHNOLOGIES, INC THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTSECURITY AGREEMENT0401360001 pdf
Sep 07 2016EMC CorporationTHE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTSECURITY AGREEMENT0401360001 pdf
Sep 07 2016EMC IP HOLDING COMPANY LLCTHE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTSECURITY AGREEMENT0401360001 pdf
Sep 07 2016MOZY, INC THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTSECURITY AGREEMENT0401360001 pdf
Sep 07 2016Spanning Cloud Apps LLCTHE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTSECURITY AGREEMENT0401360001 pdf
Sep 07 2016ASAP SOFTWARE EXPRESS, INC CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENTSECURITY AGREEMENT0401340001 pdf
Sep 07 2016Aventail LLCCREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENTSECURITY AGREEMENT0401340001 pdf
Sep 07 2016CREDANT TECHNOLOGIES, INC CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENTSECURITY AGREEMENT0401340001 pdf
Sep 07 2016Dell USA L PCREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENTSECURITY AGREEMENT0401340001 pdf
Sep 07 2016SCALEIO LLCTHE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTSECURITY AGREEMENT0401360001 pdf
Sep 07 2016Maginatics LLCTHE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTSECURITY AGREEMENT0401360001 pdf
Sep 07 2016FORCE10 NETWORKS, INC THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTSECURITY AGREEMENT0401360001 pdf
Sep 07 2016Aventail LLCTHE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTSECURITY AGREEMENT0401360001 pdf
Sep 07 2016Spanning Cloud Apps LLCCREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENTSECURITY AGREEMENT0401340001 pdf
Sep 07 2016WYSE TECHNOLOGY L L C CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENTSECURITY AGREEMENT0401340001 pdf
Sep 07 2016MOZY, INC CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENTSECURITY AGREEMENT0401340001 pdf
Sep 07 2016Maginatics LLCCREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENTSECURITY AGREEMENT0401340001 pdf
Sep 07 2016FORCE10 NETWORKS, INC CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENTSECURITY AGREEMENT0401340001 pdf
Sep 07 2016EMC IP HOLDING COMPANY LLCCREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENTSECURITY AGREEMENT0401340001 pdf
Sep 07 2016EMC CorporationCREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENTSECURITY AGREEMENT0401340001 pdf
Sep 07 2016DELL SYSTEMS CORPORATIONCREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENTSECURITY AGREEMENT0401340001 pdf
Sep 07 2016DELL INTERNATIONAL L L C CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENTSECURITY AGREEMENT0401340001 pdf
Sep 07 2016SCALEIO LLCCREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENTSECURITY AGREEMENT0401340001 pdf
Sep 07 2016DELL MARKETING L P CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENTSECURITY AGREEMENT0401340001 pdf
Sep 07 2016Dell Products L PCREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENTSECURITY AGREEMENT0401340001 pdf
Sep 07 2016DELL SOFTWARE INC CREDIT SUISSE AG, CAYMAN ISLANDS BRANCH, AS COLLATERAL AGENTSECURITY AGREEMENT0401340001 pdf
Mar 20 2019CREDANT TECHNOLOGIES, INC THE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0494520223 pdf
Mar 20 2019DELL MARKETING L P THE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0494520223 pdf
Mar 20 2019Dell Products L PTHE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0494520223 pdf
Mar 20 2019DELL INTERNATIONAL L L C THE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0494520223 pdf
Mar 20 2019EMC CorporationTHE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0494520223 pdf
Mar 20 2019FORCE10 NETWORKS, INC THE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0494520223 pdf
Mar 20 2019EMC IP HOLDING COMPANY LLCTHE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0494520223 pdf
Mar 20 2019Dell USA L PTHE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0494520223 pdf
Mar 20 2019WYSE TECHNOLOGY L L C THE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0494520223 pdf
Apr 09 2020CREDANT TECHNOLOGIES INC THE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0535460001 pdf
Apr 09 2020DELL INTERNATIONAL L L C THE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0535460001 pdf
Apr 09 2020DELL MARKETING L P THE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0535460001 pdf
Apr 09 2020Dell Products L PTHE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0535460001 pdf
Apr 09 2020Dell USA L PTHE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0535460001 pdf
Apr 09 2020EMC CorporationTHE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0535460001 pdf
Apr 09 2020FORCE10 NETWORKS, INC THE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0535460001 pdf
Apr 09 2020WYSE TECHNOLOGY L L C THE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0535460001 pdf
Apr 09 2020EMC IP HOLDING COMPANY LLCTHE BANK OF NEW YORK MELLON TRUST COMPANY, N A SECURITY AGREEMENT0535460001 pdf
Nov 01 2021Credit Suisse AG, Cayman Islands BranchDell Products L PRELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0582160001 pdf
Nov 01 2021Credit Suisse AG, Cayman Islands BranchDELL MARKETING L P RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0582160001 pdf
Nov 01 2021Credit Suisse AG, Cayman Islands BranchASAP SOFTWARE EXPRESS, INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0582160001 pdf
Nov 01 2021Credit Suisse AG, Cayman Islands BranchDELL INTERNATIONAL, L L C RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0582160001 pdf
Nov 01 2021Credit Suisse AG, Cayman Islands BranchDell USA L PRELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0582160001 pdf
Nov 01 2021Credit Suisse AG, Cayman Islands BranchCREDANT TECHNOLOGIES, INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0582160001 pdf
Nov 01 2021Credit Suisse AG, Cayman Islands BranchAventail LLCRELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0582160001 pdf
Nov 01 2021Credit Suisse AG, Cayman Islands BranchDELL SOFTWARE INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0582160001 pdf
Nov 01 2021Credit Suisse AG, Cayman Islands BranchDELL SYSTEMS CORPORATIONRELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0582160001 pdf
Nov 01 2021Credit Suisse AG, Cayman Islands BranchSCALEIO LLCRELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0582160001 pdf
Nov 01 2021Credit Suisse AG, Cayman Islands BranchMaginatics LLCRELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0582160001 pdf
Nov 01 2021Credit Suisse AG, Cayman Islands BranchMOZY, INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0582160001 pdf
Nov 01 2021Credit Suisse AG, Cayman Islands BranchFORCE10 NETWORKS, INC RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0582160001 pdf
Nov 01 2021Credit Suisse AG, Cayman Islands BranchWYSE TECHNOLOGY L L C RELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0582160001 pdf
Nov 01 2021Credit Suisse AG, Cayman Islands BranchEMC IP HOLDING COMPANY LLCRELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0582160001 pdf
Nov 01 2021Credit Suisse AG, Cayman Islands BranchEMC CorporationRELEASE BY SECURED PARTY SEE DOCUMENT FOR DETAILS 0582160001 pdf
Mar 29 2022THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTDELL MARKETING CORPORATION SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 045455 0001 0617530001 pdf
Mar 29 2022THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTDELL MARKETING L P ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO CREDANT TECHNOLOGIES, INC RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 045455 0001 0617530001 pdf
Mar 29 2022THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTSCALEIO LLCRELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 045455 0001 0617530001 pdf
Mar 29 2022THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTEMC IP HOLDING COMPANY LLC ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MOZY, INC RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 045455 0001 0617530001 pdf
Mar 29 2022THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTEMC CORPORATION ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 045455 0001 0617530001 pdf
Mar 29 2022THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTDELL MARKETING CORPORATION SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC AND WYSE TECHNOLOGY L L C RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 045455 0001 0617530001 pdf
Mar 29 2022THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTDell Products L PRELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 045455 0001 0617530001 pdf
Mar 29 2022THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTDell USA L PRELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 045455 0001 0617530001 pdf
Mar 29 2022THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTDELL INTERNATIONAL L L C RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 045455 0001 0617530001 pdf
Mar 29 2022THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTDell USA L PRELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 040136 0001 0613240001 pdf
Mar 29 2022THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTSCALEIO LLCRELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 040136 0001 0613240001 pdf
Mar 29 2022THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTEMC IP HOLDING COMPANY LLC ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MOZY, INC RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 040136 0001 0613240001 pdf
Mar 29 2022THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTEMC CORPORATION ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO MAGINATICS LLC RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 040136 0001 0613240001 pdf
Mar 29 2022THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTDELL MARKETING CORPORATION SUCCESSOR-IN-INTEREST TO FORCE10 NETWORKS, INC AND WYSE TECHNOLOGY L L C RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 040136 0001 0613240001 pdf
Mar 29 2022THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTDell Products L PRELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 040136 0001 0613240001 pdf
Mar 29 2022THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTDELL INTERNATIONAL L L C RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 040136 0001 0613240001 pdf
Mar 29 2022THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTDELL MARKETING CORPORATION SUCCESSOR-IN-INTEREST TO ASAP SOFTWARE EXPRESS, INC RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 040136 0001 0613240001 pdf
Mar 29 2022THE BANK OF NEW YORK MELLON TRUST COMPANY, N A , AS NOTES COLLATERAL AGENTDELL MARKETING L P ON BEHALF OF ITSELF AND AS SUCCESSOR-IN-INTEREST TO CREDANT TECHNOLOGIES, INC RELEASE OF SECURITY INTEREST IN PATENTS PREVIOUSLY RECORDED AT REEL FRAME 040136 0001 0613240001 pdf
Date Maintenance Fee Events
Oct 16 2007ASPN: Payor Number Assigned.
May 02 2011M1551: Payment of Maintenance Fee, 4th Year, Large Entity.
Apr 30 2015M1552: Payment of Maintenance Fee, 8th Year, Large Entity.
Mar 25 2019M1553: Payment of Maintenance Fee, 12th Year, Large Entity.


Date Maintenance Schedule
Oct 30 20104 years fee payment window open
Apr 30 20116 months grace period start (w surcharge)
Oct 30 2011patent expiry (for year 4)
Oct 30 20132 years to revive unintentionally abandoned end. (for year 4)
Oct 30 20148 years fee payment window open
Apr 30 20156 months grace period start (w surcharge)
Oct 30 2015patent expiry (for year 8)
Oct 30 20172 years to revive unintentionally abandoned end. (for year 8)
Oct 30 201812 years fee payment window open
Apr 30 20196 months grace period start (w surcharge)
Oct 30 2019patent expiry (for year 12)
Oct 30 20212 years to revive unintentionally abandoned end. (for year 12)